Results 1 - 10
of
828
Privacy Preserving Mining of Association Rules
, 2002
"... We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transactions. While it is feasible to recover association rules and preserve privacy using a straightforward "uniform" ..."
Abstract
-
Cited by 332 (8 self)
- Add to MetaCart
We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transactions. While it is feasible to recover association rules and preserve privacy using a straightforward "
A framework for high-accuracy privacy-preserving mining
- In Proceedings of the 21st IEEE International Conference on Data Engineering
, 2005
"... To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, we present FRAPP, a generalized matrix-theoretic framework of random perturbation, which facilitates a systematic approac ..."
Abstract
-
Cited by 71 (1 self)
- Add to MetaCart
approach to the design of perturbation mechanisms for privacy-preserving mining. Specifically, FRAPP is used to demonstrate that (a) the prior techniques differ only in their choices for the perturbation matrix elements, and (b) a symmetric perturbation matrix with minimal condition number can
An Improved Privacy Preserving Mining over Centralized Databases
"... Abstract: Secure mining of association rule mining over horizontal databases is always an interesting research issue in the field of knowledge and data engineering. In horizontal partitioning or data bases, databases are integrated from various data holders or players for applying association rule ..."
Abstract
- Add to MetaCart
mining over integrated database. In this paper we are proposing a privacy preserving mining approach with Improved LaGrange’s polynomial equation for secure key generation and Binary Matrix approach.
An Architecture for Privacy-preserving Mining of Client Information
, 2002
"... Due to privacy concerns, clients of some services may not want to reveal their private information. Even in these situations, data mining is feasible without sacrificing user privacy. Prior approaches to this problem generally trade o# accuracy for security, without giving provable bounds on securit ..."
Abstract
-
Cited by 27 (6 self)
- Add to MetaCart
on security. Alternatives to the randomization technique are required to enable accurate data mining while strictly preserving privacy. In this paper, we present a general architecture that enables privacypreserving mining of client information. Under some reasonable assumptions, we show that our methods
On Addressing Efficiency Concerns in Privacy-Preserving Mining
- PROC. OF 9TH INTL. CONF. ON DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA
, 2004
"... Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage ..."
Abstract
-
Cited by 27 (2 self)
- Add to MetaCart
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage
Privacy-Preserving Mining of Association Rules on Distributed Databases
"... Data mining techniques can extract hidden but useful information from large databases. Most efficient approaches for mining distributed databases suppose that all of the data at each site can be shared. However, source transaction databases usually include very sensitive information. In order to obt ..."
Abstract
- Add to MetaCart
-phase, privacy-preserving, distributed data mining scheme. It is based on the Kantarcioglu and Clifton’s Scheme (KCS) and reduces the quantities of global candidates that are encrypted and reduces the transmission load without raising the risk of itemsets leak in the first phase. Moreover, to increase
A Frame Work for Ontological Privacy Preserved Mining
"... Data Mining analyses the stocked data and helps in foretelling the future trends. There are different techniques by which data can be mined. These different techniques reveal different types of hidden knowledge. Using the right procedure of technique result specific patterns emerge. Ontology is a sp ..."
Abstract
- Add to MetaCart
cannot be revealed, therefore security is the most important feature dealt in all technologies and work places. Data mining and Ontology techniques when integrated would capitulate an efficient system capable of selecting the appropriate algorithm for a data mining technique and privacy preserving
Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases ⋆ Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases Extended Abstract
"... Abstract. Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of data mining-as-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, ..."
Abstract
-
Cited by 17 (1 self)
- Add to MetaCart
the extracted patterns received from the server. In this paper, we study the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework. We propose a scheme for privacy preserving outsourced mining and show that the owner can recover the true patterns as well
Results 1 - 10
of
828